2019 Next Gen Data Protection

Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

Specific discussion topics include:

- Open Source tools for data theft available to attackers and defenders
- Understanding how exposed data is found and exploited from an attacker’s perspective
- What you should do if you identify a potential data breach

One of the most important ways to reduce risk and stay compliant within an organization revolves around secure access to regulated or critical data. Whether protecting state, federal, internationally regulated data or whether protecting intellectual property specific to an organization, secure access is a way to reduce risk with respect to sensitive information. Intelisecure’s CTO Jeremy Wittkop is going talk through the technologies and process around secure access along with the process and technologies to ensure information accessed security and with the proper controls and governance in place to ensure risk is kept to a minimum.

At the heart of every Insider Threat program is protecting Critical Intellectual Property from Insider risk. Intelisecure’s CTO will discuss how Insider Risk and critical Intellectual property intersect, “Combining Insider Threat and Protecting Critical IP” webinar will outline the risks associated with having a data protection program without an Insider Risk Program and what organizations can do in order to properly protect their intellectual property of from insider threats based on processes and technologies.

In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. Intelisecure’s Cosmo Romero and Forcepoint's Antonio Sanchez will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable (albeit sketchy) business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web? What drives it? What can we do about it? This session breaks through the myths, and provides attendees with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground.

All firms licensed to do business with the State of New York must comply. Although state regulators have allowed a grace period, firms must show progress taking steps to conform to the new regulations.

Join InteliSecure's Chief Technology Officer, Jeremy Wittkop and Boldon James as they discuss what is contained in the regulation, who is in scope, how you can use people, processes, and technologies such as Boldon James to become more compliant, and some of the consequences associated with a failure to do so.

At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.

The National Institute of Standards and Technology has released an update to their Risk Management Framework (RMF). It is creatively titled RMF 2.0. Notably part of its much longer official name, the framework focuses on taking a “System Life Cycle Approach for Security and Privacy”. What does that mean? Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop [Date and Time] to find out!
Specific discussion topics include:

•Risk Management Framework 2.0 Seven Major Objectives
•A Review of what is included in the new “Prepare” step
•Practical Applications of NIST Framework guidance
•Privacy Risk Management and the polarity of privacy and security

Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

Specific discussion topics include:

- Open Source tools for data theft available to attackers and defenders
- Understanding how exposed data is found and exploited from an attacker’s perspective
- What you should do if you identify a potential data breach

InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.